Configuring Command Authorization - 3Com 4210G Series Configuration Manual

24-port/48-port
Hide thumbs Also See for 4210G Series:
Table of Contents

Advertisement

# Create a local user named guest and enter local user view.
[Sysname] local-user guest
# Set the authentication password to 123456 (in plain text).
[Sysname-luser-guest] password simple 123456
# Set the service type to Terminal.
[Sysname-luser-guest] service-type terminal
[Sysname-luser-guest] quit
# Enter AUX user interface view.
[Sysname] user-interface aux 0
# Configure to authenticate the user logging in through the Console port in the scheme mode.
[Sysname-ui-aux0] authentication-mode scheme
# Set the baud rate of the Console port to 19200 bps.
[Sysname-ui-aux0] speed 19200
# Set the maximum number of lines the screen can contain to 30.
[Sysname-ui-aux0] screen-length 30
# Set the maximum number of commands the history command buffer can store to 20.
[Sysname-ui-aux0] history-command max-size 20
# Set the timeout time of the AUX user interface to 6 minutes.
[Sysname-ui-aux0] idle-timeout 6
2)
Configure the authentication scheme
Configure the authentication server by referring to related parts in AAA Configuration.
After the above configurations, you need to modify the configurations of the terminal emulation utility
running on the user PC accordingly, as shown in
the configurations of the terminal emulation utility and those of the switch. Otherwise, you will fail to log
in to the switch.

Configuring Command Authorization

By default, command level for a login user depends on the user level. The user is authorized the
command with the default level not higher than the user level. With the command authorization
configured, the command level for a login user is decided by both the user level and AAA authorization.
If a user executes a command of the corresponding user level, the authorization server checks
whether the command is authorized. If yes, the command can be executed.
The authorization server checks the commands authorized for users through the username, and thus
the command authorization configuration involves three steps:
1)
Configure to use username and password authentication when users log in.
2)
Enable command authorization. See the following table for details.
3)
Configure an authorization scheme. Specify the IP address and other related parameters for the
accounting server. For details, refer to the AAA Configuration in the Security Volume.
Follow these steps to enable command authorization:
To do...
Enter system view
Figure
2-4, thus ensuring the consistency between
Use the command...
system-view
2-11
Remarks

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

4210g nt4210g pwr

Table of Contents